

Our mission is to lead innovation by providing the most advanced solutions in reliability and sustainability to empower…
REC is looking to the future by aligning business goals with Saudi Arabia’s 2030 Vision. Part of this is investing in our young people and their future.
Reliability Expert Center was established with the strategic vision of spreading a reliability and sustainability culture across Saudi Arabia.
All Synthesis applications store analysis information in a centralized database (Synthesis repository) that supports simultaneous access by multiple users and shares relevant reliability information between Synthesis-enabled software tools.
When you are working with a Synthesis repository with login security enabled, the flexible Security Groups feature makes it possible to provide each user account with different types of access for different types of projects in the database, if desired. For example, suppose you want to grant a user read/write access to all projects that belong to her own organizational group (Department A), read-only access to all projects that belong to another group (Department B and Department C), and no access at all to projects that have been classified as “Confidential.”
A user with “Admin” permissions in the Synthesis repository can perform three simple steps to configure the security settings to support this requirement:
Choose File > Manage Repository > Authorized Users. On the Security Groups tab, create the security groups shown next.

Return to the Users tab and create an account for the user from Department A. As shown in the following picture, she will be a member of the “Department A” security group (which will provide read/write access for all projects that are maintained by her own group) and also the “Read-Only” security group (which will provide read-only access for any project in the repository except the ones classified as “Confidential”).

Choose Project > Management > Manage Projects and assign the appropriate security groups for every project in the repository. For example, the following picture shows the security settings for one of the projects maintained by Department A. Users in Department A will be able to access this project with the full set of read/write permissions that have been granted to the “Department A” security group, while users in other departments will have the limited read-only permissions that have been granted to the “Read-Only” security group.
